Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ea7aec679446c8f7f48550bf7ce9b2d1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea7aec679446c8f7f48550bf7ce9b2d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7aec679446c8f7f48550bf7ce9b2d1_JaffaCakes118.html
-
Size
37KB
-
MD5
ea7aec679446c8f7f48550bf7ce9b2d1
-
SHA1
b2d77b2ee1b6e72e63780017d50d0d7542f11474
-
SHA256
eda25d676878381447c7930feafdade59e3661d66ef1f2ba631f34b13d135c0f
-
SHA512
ac9313b6be98b111e9a6ca99366f49b51a861bdd46c4f659dba5d5d8f2e456a81e4c124442fa2d78aaa563a417931ddbed148e1daf75f5ef94a5d5937ea6d043
-
SSDEEP
768:pEoeCIiA8fDijI2uDSW3Nf8fDg3sVxzWauDSle:GoeCIiA8fDijINDSEf8fDg3sVxzWauD/
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 1496 msedge.exe 1496 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2948 1496 msedge.exe 82 PID 1496 wrote to memory of 2948 1496 msedge.exe 82 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 1300 1496 msedge.exe 83 PID 1496 wrote to memory of 2320 1496 msedge.exe 84 PID 1496 wrote to memory of 2320 1496 msedge.exe 84 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85 PID 1496 wrote to memory of 2156 1496 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea7aec679446c8f7f48550bf7ce9b2d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc103f46f8,0x7ffc103f4708,0x7ffc103f47182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12104345168944198295,11009022579343592512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
309B
MD5ee43a05911ca30bea53822f8221b1302
SHA129cfbae568dffc0fbd9d56dd80e8a1d997f13124
SHA256df83cb4d09216cefb396b41bf0d459e5075b54d0f39f5bf419d74349dce2fce5
SHA51217c8c835df204a854f7d59184f10a89486630074833bc4513a37e9d66041433dc246aa31f12c6f68f41074cb0647db23fe99fa98b513e6c8d3da5fc7bb317a6b
-
Filesize
5KB
MD594dcbfdf6aa2d14f0df36067ebeab49a
SHA1f6eb82d06ff5cc294d17cf29daa983a7a196a5be
SHA2562baae8118cb95f3db6036a4b2b7834448fb0c6b6acee214b53e68e6736b4ef49
SHA512000a1e94ab1b3fcfd9c6087bb04c530f232a5a3aa764a64f49348c4dc86eb1bad5ae715a8710ca6101c77bedce79d6937511c9ab36677b0f14f3e252700f283d
-
Filesize
6KB
MD5c315b72871cf28ecea64afaf85a133de
SHA1dd77cd6337f0e6f94bd1611a84be17e1ddb43d76
SHA256a183c8103186f9eeae6a0c7071bcd05943dd717b4031d8d6a8712f18e0e254f5
SHA5128a89c7e2946499db6478b12487528fe733ce630b55612c3b446e44ffacd87111b300e061077ceecbcd05de661dab6a5ca7e06c6c85d18e459aa3ad043613ede3
-
Filesize
10KB
MD535197f0a8e2fcc4e53b88f394a7d0e0f
SHA1ec934c064923cd6e7d7979812c8abb671ccb8b2f
SHA2564f37e78e047f54392ccd461e493e2b2bae67c84009bdb4213244cc611d0bc76b
SHA512e305d6e29641ed6d7a76a7244f4b2f24966f8714b0bff1c0d6dc780d85474d4b93ff30a05c5ccbcc72ee63bc9557dfcac64b474847110b99cd808746b7742dea